[36252] in Kerberos
Re: What happened to PKCROSS?
daemon@ATHENA.MIT.EDU (Jeffrey Altman)
Thu Jul 3 00:21:54 2014
X-Envelope-From: jaltman@secure-endpoints.com
X-MDaemon-Deliver-To: kerberos@mit.edu
Message-ID: <53B4DA4E.7070402@secure-endpoints.com>
Date: Thu, 03 Jul 2014 00:21:34 -0400
From: Jeffrey Altman <jaltman@secure-endpoints.com>
MIME-Version: 1.0
To: Nico Williams <nico@cryptonector.com>,
Rick van Rein <rick@openfortress.nl>
In-Reply-To: <CAK3OfOi+5t-V9oKj1NZYnQiKvHHiyB_u4v0ykuPdZBCVFKeuKg@mail.gmail.com>
Cc: "kerberos@mit.edu" <kerberos@mit.edu>
Content-Type: multipart/mixed; boundary="===============0436655209=="
Errors-To: kerberos-bounces@mit.edu
This is a cryptographically signed message in MIME format.
--===============0436655209==
Content-Type: multipart/signed; protocol="application/pkcs7-signature";
micalg=sha1; boundary="------------ms050805030608030504000305"
This is a cryptographically signed message in MIME format.
--------------ms050805030608030504000305
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
On 7/2/2014 12:11 PM, Nico Williams wrote:
> No. Heimdal has a kx509 server and client. And there are other
> implementations:
>=20
> https://secure-endpoints.com/kcacred/index.html
That is the link to the Network Identity Manager provider. The Active
Directory Service implementation is here
http://www.secure-endpoints.com/kca_service/
Note that TAGPMA has certified this implementation as a method for
obtaining Short Lived Certificates using Kerberos.
Jeffrey Altman
Secure Endpoints Inc.
--------------ms050805030608030504000305--
--===============0436655209==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
________________________________________________
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos
--===============0436655209==--